作者: Jensen J. Zhao , Sherry Y. Zhao , Sherry Y. Zhao
DOI: 10.1016/J.GIQ.2009.07.004
关键词: Cloud computing security 、 Information security 、 Information security audit 、 Internet privacy 、 Computer security 、 Internet security 、 Security information and event management 、 Business 、 Security service 、 Asset (computer security) 、 Security through obscurity
摘要: Abstract This study assessed the security of U.S. state e-government sites to identify opportunities for and threats their users. The used a combination three methods – web content analysis, information auditing, computer network mapping data collection analysis. findings indicate that most posted privacy policy statements; however, only less than half stated clearly what measures were in action. Second, audit revealed 98% secured users' accounts with SSL encryption transmission, sites' search tools enable public users only. Third, although had internet ports filtered or behind firewalls, all them main IP addresses detected port 80/tcp open. discussed suggested possible solutions improving security.